New! View global litigation for patent families

WO2014056731A1 - Method and device for operating a vehicle application - Google Patents

Method and device for operating a vehicle application

Info

Publication number
WO2014056731A1
WO2014056731A1 PCT/EP2013/070195 EP2013070195W WO2014056731A1 WO 2014056731 A1 WO2014056731 A1 WO 2014056731A1 EP 2013070195 W EP2013070195 W EP 2013070195W WO 2014056731 A1 WO2014056731 A1 WO 2014056731A1
Authority
WO
Grant status
Application
Patent type
Prior art keywords
vehicle
application
action
messages
decision
Prior art date
Application number
PCT/EP2013/070195
Other languages
German (de)
French (fr)
Inventor
Stefan GÖTZ
Ulrich STÄHLIN
Original Assignee
Continental Automotive Gmbh
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/12Network-specific arrangements or communication protocols supporting networked applications adapted for proprietary or special purpose networking environments, e.g. medical networks, sensor networks, networks in a car or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Abstract

In the method, each received vehicle-to-X message (N) is at least partly forwarded to at least one application (30) of a vehicle depending on specified information of the vehicle-to-X message (N), said vehicle-to-X message (N) comprising a digital signature. Digital signatures of the vehicle-to-X messages (N_rel) which are relevant to the decision that a specified action of the application (30) should be carried out are validated depending on a decision signal (D) which is provided in response to the vehicle-to-X messages (N) being forwarded to the at least one application (30) and which represents an assertion as to whether the vehicle-to-X messages (N) comprise data causing the action to be carried out. Furthermore, a signal (S) is provided depending on a result of the validation of the digital signatures, said signal representing a credibility of the vehicle-to-X messages (N_rel) which are relevant to the decision.

Description

description

Method and apparatus for operating an application of a vehicle

The invention relates to a method and an apparatus for operating an application of a vehicle and a vehicle ¬ system, comprising the device and the application.

In the vehicle-to-vehicle communication and vehicle-to-infrastructure communication to communicate with other vehicles vehicles or vehicles with infrastructure facilities. This communication is collectively referred to as a vehicle to-X communication (V2X communication). Such V2X systems are used in particular for the exchange of data for use in a driving assist system and / or a security system of vehicles. One problem is ensuring the necessary data authenticity of the transmitted vehicle-to-X information, as this information can be used as a basis for intervention in the vehicle control. A wrong or at worst even ge ¬ falsified vehicle-to-X information can therefore have serious consequences and reliable must be recognized as not trustworthy.

The object on which the invention is based is to provide a method and a corresponding device for Operator Op ¬ ben an application for a vehicle, and a driving-forming system, which make a contribution to this is, an efficiency and / or reliability of an embodiment of the to increase use in the vehicle.

The object is solved by the features of the independent claims. Advantageous developments of the invention are characterized in the subclaims.

According to a first and second aspects of the ¬ He invention is characterized by a method and a corresponding device for operating at least one application for a vehicle. Here, a respective received vehicle-to-X message is forwarded depending on a predetermined information to the vehicle-to-X message at least partly to the at least one application. The vehicle-to-X message here includes a digital signature. Depending on a decision signal on the transmission of vehicle-to-X messages to the at least one application is riding provided loading in response and a statement representing whether the vehicle-to-X messages include data execution triggering a predetermined action of the application, the digital signatures of the vehicle-to-X messages are validated, which are relevant to the decision that the action should be executed. Further, a signal is bereitge ¬ represents a function of a result of the validation of digital signatures, which is representative of a reliability of the decision-relevant vehicle-to-X messages. This has the advantage that for the vehicle-to-X communication, a public key infrastructure (PKI) can be used. It can be used cryptographic Alogrithmen.

The vehicle-to-X messages each have a digital signature. It is particularly advantageous that the respective applications decide if a vehicle-to-X message ge ¬ uses will and depending on whether the received vehicle-to-X message is actually relevant for the vehicle, the vehicle-to- message to be validated. This has the advantage that not the digital signatures of all received vehicle-to-X messages must be validated. Characterized computing power can be saved and manufacturing costs for a safety device, which is configured to perform the validation of digital signatures, can be reduced. Furthermore, this can contribute to increase the reliability of recognizing the trustworthiness of the vehicle-to-X messages as more computing power can be taken to faster and / or more accurate to consider.

The particular application of the vehicle may include a driving support system and / or a security system and / or a comfort system of the vehicle. The respective action can in this case in particular, a respective vehicle function comprehensive sen, which is recognizable to a vehicle user, for example, information signaling for a driver, a warning signal signaling, an intervention into the driving dynamics of the vehicle and so on.

In an advantageous embodiment of the first and second aspects, the decision-relevant vehicle-to-be X

News validated and the signal provided prior to execution of the predetermined action of the application, and depending on the signal, the execution of the predetermined action of the application is started. Advantageously, this enables the validation and verification of the Trust ¬ enswürdigkeit of decision-relevant vehicle-to-X messages to perform before running the specified action. This can be used to advantage for Akti ¬ tions that particular fen vehicle safety betref-.

In a further advantageous embodiment according to the first and second aspects, the decision-relevant vehicle-to-X messages are validated and the signal bereitge- sets during execution of the predetermined action and depending on the supplied signal is the execution of at least a predetermined action of the application stopped. Advantageously, this enables the validation and verification of the trustworthiness of the decision-relevant vehicle-to-X messages, perform already during the execution of the given action. This can advantageously be used for actions that are very time sensitive and require a quick response. In a further advantageous embodiment according to the first and second aspect, the predetermined action is a

Associated with urgency and depending on the urgency of the action, the decision-relevant vehicle-to-X messages are validated and generates the signal either before the prescribed action the application is started or currency ¬ rend the prescribed action the application is running. With the assignment of urgency can be set easily, which are very time-critical actions and which ones seem. This enables a simple decision as to whether the validation prior to execution of the respective action or during the execution of the action has to take place. In a further advantageous embodiment according to the first and second aspects of the urgency is preset. This allows for easy evaluation of the relative urgency for the action and thus a very quick decision whether to validate before executing the particular action or during the execution of the action has to take place.

In a further advantageous embodiment according to the ERS, and th second aspect, the emergency message is determined depending on at least one of the decision-relevant vehicle-to-X. This has the advantage that the Dring ¬ friendliness can be determined promptly. The respective ent ¬ decision relevant vehicle-to-X-message may include user data which specify a possible response time for the execution of the predetermined action, such as user data, which represent a time period up to a collision (time-to-collision, TTC). In a further advantageous embodiment according to the first and second aspects of the validation is considered complete and the signal is provided when one of the decision-making ¬ relevant vehicle-to-X message is classified as unreliable. Advantageously, this may give a time period for the validation low. Once one of the decision-making vehicle-to-X messages is classified as not trustworthy and therefore as unreliable, the validation can be stopped and the execution of the respective action is not started relational be stopped.

In a further advantageous embodiment according to the first and second aspects, the decision-relevant when a total number of decision-relevant vehicle-to-X messages exceeds a threshold obe- ren,

Vehicle-to-X messages randomly validated. Advantageously, this enables quick validation of the decision-making vehicle-to-X messages. This can be used particularly advantageous if the total number of decision-relevant vehicle-to-X message is very large, for example in a traffic jam warning, which is transmitted by a variety of vehicles. In a further advantageous embodiment according to the first and second aspect, the digital signature of one or more specific vehicle-to-X messages are dependent on a number of vehicle-to-X messages that span in a given time are received, validates before each of the at least be associated with an application, the particular vehicle-to-X message is classified as spe ¬-specific vehicle-to-X message depends on at least one predetermined criterion. This can be used advantageously when a computing capacity of the Si ¬ cherheitseinrichtung that is configured to perform the validation of digital signatures, completely or not is very heavily loaded. In this case, the digital signatures that specific vehicle-to-X messages can already be validated before they are assigned to a particular application and before they are classified as decisive ¬ dung relevant. This allows each specific vehicle-to-X message must not be lidiert va- if it is used for a decision on whether the respective predetermined action is performed.

In a further advantageous embodiment according to the first and second aspect, when a plurality of Entscheidungssigna- le at the same time or may be provided within a predetermined period, in each case an action priority ermit ¬ telt for the respective actions, depending on predetermined rules and become dependent on the respectively determined action priorities validates the respective decision-making vehicle-to-X messages of actions. Advantageously, enabling this, when multiple applications decide simultaneously or nearly simultaneously, that a predetermined application is to be performed can be determined depending on the respective action priorities, which are to be carried out the operations in general, and / or the order in which respective actions are executed.

According to a third aspect, the invention features a vehicle system comprising a device according to the second aspect and a predetermined application of the

Depending to decide the vehicle, wherein the application is formed by the at least partially forwarded to the application of vehicle-to-X messages, whether at least a predetermined action of the application is to be executed. Further, the application is adapted to the decision signal, which is re presentative ¬ that the vehicle-to-X messages DA th comprise trigger the execution of a predetermined action of the application to provide for the apparatus. Further, the application is configured to control a function of the signal generated by the device, which is representative of the reliability of the decision-relevant vehicle-to-X message, the execution of at least a predetermined action.

Advantageous embodiments of the first and second aspects apply here also for the third aspect.

Embodiments of the invention are explained below with reference to the schematic drawings. Show it:

1 shows a block diagram for a vehicle system,

2 shows an example flow diagram for a first

Program for operating an application and

Figure 3 is an exemplary flow chart for a second

Program for operating the application.

Elements of the same design or function are all figures indicated by the same reference numerals. 1 shows an exemplary embodiment of a vehicle system 10th

The vehicle system 10 includes an application 30 for a vehicle and a device 20 for operating the application 30. The device 20 is in this embodiment, a

Communication device 22 assigned. Alternatively, the device 20 may include the communication device 22nd

The apparatus 20 may comprise a specific control device of the vehicle or a central processing unit of the vehicle. The device 20 is signally coupled to the communication device 22nd The Kommunikationsein- device 22 is formed, predetermined vehicle-to-X-N demand directed from other vehicles and / or to receive infrastructure facilities, which are located in a predetermined environment of the vehicle. The N vehicle-to-X-After-directed include user data and safety data. The driving convincing-to-X messages N include a digital signature. This allows an assurance of vehicle-to-X-After-N report to consider. A calculation of the digital signature, for example, based on an elliptic curve Kryptogra-phie- algorithm.

The application 30 includes, for example, a driver assistance system. Alternatively or additionally a security system of the vehicle and / or a comfort system of the vehicle can comprise the application 30th The application 30 is formed, from ¬ pending to decide from the application 30 at least partially white ¬ tergeleiteten vehicle-to-X-N messages, whether to execute at least one predetermined action of the application 30th Further, the application 30 is formed, a decision signal D, which is representative that the

Vehicle-to-X-N messages include data that trigger an execution of a predetermined action of the application 30 to provide for the apparatus 20th Further, the application 30 is formed, depending on the ER- witnessed by the device 20 signal S which is representative of the Reliable ¬ ness of the decision-relevant vehicle-to-X message N_rel, at least to control the execution of a predetermined action. The device 20 may be formed, for example, a respective copy of the vehicle-to-X-N message zwischenzuspei- manuals and label. The application 30 may be configured to signal the device 20 that vehicle are relevant to their to-X messages N for the respective action, such as taking advantage of this labeling so that the device 20 to vehicle validation of the signatures of the decision-making -X messages N_rel can perform for the action. Figure 2 shows an example flow diagram for a first program for operating an application 30 of a vehicle. The device 20 for operating the application 30 of the vehicle includes, for example, an arithmetic unit and ei ¬ NEN program memory and is formed, the first program out. In the example shown in Figure 2 flow chart is in a

Step S10, the first program started. The first program can be ge ¬ for example, starts with an activation of the vehicle. In a step S12 a respective predetermined Informa ¬ tion of the respective received vehicle-to-X message N is ¬ evaluated and depending on the predetermined information to the vehicle-to-X message N is the vehicle-to-X message N at least partially to the forwarded at least one application 30 WEI. The vehicle-to-X message N in this case comprises a digital signature.

In a step S14 whether 30 a decision signal D is provided by the at least one application is detected. It can 30 are provided at the same or approximately the same time or ¬ also detected more decision signals D of MEH ¬ reren applications.

In a step S16 to be dependent on the particular decision signal d to the at least one application 30 is provided in response to the forwarding of the vehicle-to-X messages N and a statement representing whether the vehicle-to- X-N messages include data that trigger an execution of a predetermined action of the application 30, validates the digital signature of the vehicle-to-X messages N_rel that are relevant for the decision as for ¬ that the action should be executed.

The validation in this case comprises in particular a Fung Überprü- whether the decision-relevant vehicle-to-X message N_rel is trustworthy depending on the digital Signa ¬ structure.

If it is determined in step S16 that the decision-relevant vehicle-to-X messages N_rel are trusted, a Steuersig ¬ nal, for example, in a step S18, is generated and output, which has a first state ZI up, wherein the first state is representative that the decision-relevant vehicle-to-X messages N_rel have sufficient reliability and that the given before ¬ action of the application can be executed 30th

If it is determined in step S16 that the decision ¬ relevant vehicle-to-X messages N_rel are not trusted, the STEU ¬ ersignal is generated and output, for example, in the step S18, that has a second state Z2, wherein the second state representative is that the decision-relevant vehicle-to-X messages N_rel not have sufficient reliability and that the prescribed action the application 30 is not carried out who should ¬.

Preferably, the first program will be continued after the step S18 in step S12. In a step S19, the program can be terminated. It may be provided that the predetermined action is an emergency is allocated and depending on the Dring ¬ friendliness of the action, the decision-relevant vehicle is validated to X N_rel message and generates the signal S. For example, has the action medium or low priority on the decision-relevant vehicle can be validated to-X message N_rel and the signal S bereitge ¬ presents are before execution of the given action the application 30. Depending on the signal S is the execution tion started the predetermined action, the application 30 or not started.

on the other hand, the action a high priority on the decision-relevant vehicle-to-X message N_rel va- can lidiert and the signal S will be provided during the

Execution of the prescribed action. Depending on the signal S provided the execution of at least a predetermined action of the application 30 is either stopped or continue to run. This can be used to advantage for time-critical actions that require the fastest possible response and can not wait several milliseconds for validation. Such a time critical action may play examples, activation of a warning lamp and / or a priming of the brakes comprise. At the same time or approximately coinciding with the beginning of the action, the validation is started.

The urgency of the predetermined action may be predefined in this case or may be determined as a function of at least one of the decision-relevant vehicle-to-X messages N_rel.

Further, it can be provided that, especially when the decision-relevant vehicle-to-X messages N_rel are successively and / or validated in turn, the validation ¬ tion is already considered complete and the signal S is provided readiness as soon as one of the decision-relevant vehicle-to-X messages N_rel is classified as unreliable.

in each case a sample is drawn may be further provided that if many decision-relevant vehicle-to-X messages N_rel present for the action, from the set of decision-making on-vehicle-to-X messages N_rel for this action. For example, if the validation of the sample is successful, the action is performed. In a predetermined next time step, the next sample is verified. This process is repeated so ¬ until the application has 30 stops the action or the application stops the 30th Furthermore, it can be provided that when a plurality of decision signals D are provided at the same time or within a pre-¬ given period of time, each having a Akti ¬ onspriorität is determined for the action, depen ¬ gig of predetermined rules and dependent on the particular ER-mediated action priorities the respective decision-making vehicle-to-X messages N_rel the actions validated.

3 shows an example flow diagram for a two-th program for operating an application 30 of a vehicle. The apparatus 20 is configured to perform addition or alternatively to the first program, the second program.

The program steps S20, S22, S24, S26, S28 and S29 of the second program in this case correspond to the program steps S10 to S19 of the first program.

In contrast to the first program, a query, how great is the check number of received vehicle-to-X messages N and an associated checking a computing capacity of the device 20. Points takes place in the second program in a step S21, the device 20 sufficient computing capacity C, in a step S23, the digital Sig ¬ nature of one or more specific vehicle-to-X-th Nachrich- N_spe is validated prior to each of the at least one

Application is assigned to the 30th If the validation of each ¬ weiligen specific vehicle-to-X message N_spe that it is trustworthy, the relevant specific vehicle-to-X message is N_spe depending on the predetermined in- formation at least partially, in a step S25 at which each ¬ relevant application 30 forwarded. The application 30 is designed in this case to evaluate this trustworthy specific vehicle-to-X message N_spe suitable. The respective car-to-X-N message is thereby classified as spe ¬-specific vehicle-to-X message N_spe function of at least one predetermined criterion. The classification as a specific vehicle-to-X message N_spe can take place at ¬ play as the following criteria:

- Hierarchy, that is in a pre-processing a

Ranking of the vehicle-to-X messages N are determined and dependent upon this order of the vehicle-to-X messages classified as N specific vehicle-to-X message N_spe;

Distance, that is, the vehicle-to-X-N message, which indicates the smallest distance of the other vehicle to the vehicle, is classified as a specific vehicle-to-X message N_spe;

- time to collision (TTC), that is, the vehicle-to-X- N message, which up to the collision sig- nalized the smallest time is classified as a specific vehicle-to-X message N_spe;

History, that is, the vehicle-to-X messages N that are sent periodically and in a previous cycle switch lus already interesting and / or relevant to their wa ¬ reindeer, are classified as specific vehicle-to-X messages N_spe;

Flags, ie which have a special identification, gene, for example Rettungswa- or emergency braking, the vehicle-to-X messages N, as specific vehicle-to-

X-News N_spe unclassified;

Message type, that is, the vehicle-to-X-N messages are dependent on a message type, they comprise N_spe sheet classified as specific vehicle-to-X messages; possible message types are here late (signal phase and timing), DENM (Decentralized Environmental No- tification Message) and CAM (Cooperative Awareness Messa ¬ ges). In particular, can be specified depending on the type of message and an order of evaluation.

Claims

A method of operating at least one application (30) for a vehicle, in which
- a respective received vehicle-to-X message (N) depending on a predetermined information to the vehicle-to-X message (N) is at least partially passed on to ¬ least an application (30), wherein the vehicle -to-X message (N) comprises a digital signature,
- depending on a decision signal (D) which is in
Reply to the forwarding of the vehicle-to-X messages (N) to the at least one application (30) is provided and that a statement representing whether the vehicle-to-X messages (N) comprise data representing an exemplary triggering a predetermined action by the application (30), the digital Signatu ¬ ren the vehicle-to-X messages (N_rel) to be validated, which are relevant for this decision is that the action should be executed, and
- is provided depending on a result of the validation of the digital signatures, a signal (S) representative of a reliability of the decision-relevant vehicle-to-X messages (N_rel).
The method of claim 1, wherein the decision-relevant vehicle-to-X messages (N_rel) to be validated and the signal (S) is provided prior to execution of the given action by the application (30), and depending on the signal (S) which execution of the predetermined action by the application (30) is started.
The method of claim 1, wherein the decision-relevant vehicle-to-X messages (N_rel) to be validated and the signal (S) provided during execution of the predetermined action and depending on the supplied signal (S) implementing at least one predetermined action of the application (30) is stopped. A method according to any one of claims 2 or 3, wherein the predetermined event is assigned a priority, and depending the ent ¬ decision relevant vehicle-to-X messages (N_rel) validated by the urgency of the action and the signal (S) is generated, either will be ¬ started before the prescribed action the application (30) or during the prescribed action the application (30) is executed.
The method of claim 4, wherein the urgency is preset.
The method of claim 4, wherein the emergency function of at least one of the decision-relevant vehicle-to-X messages (N_rel) is determined.
Method according to one of the preceding claims, wherein the validation is considered complete and the signal (S) is provided, as soon as one of the decision ¬ relevant vehicle-to-X messages (N_rel) is classified as unreliable.
Method according to one of the preceding claims, wherein when a total number of decision-relevant vehicle-to-X messages (N_rel) exceeds an upper limit value, the decision-relevant vehicle-to-X messages (N_rel) are randomly validated.
Method according to one of the preceding claims, wherein depending on a number of vehicle-to-X messages (N) which are received in a predetermined time period, the digital signature of one or more specific vehicle-to-X messages (N_spe) be validated before they are each associated with the at least one application (30), wherein the respective vehicle-to-X message (N) as a specific vehicle-to-X message (N_spe) is classified depending on at least one predetermined criterion.
Method according to one of the preceding claims, wherein, when a plurality of decision signals (D) simultaneously or bereitge ¬ is within a predetermined period are
- in each case an action priority is determined for the given action depending on predetermined rules, and
- depending on the respectively determined Aktionsprioritä- the respective decision-relevant vehicle th to-X messages (N_rel) actions to be validated.
The apparatus (20) for operating an application (30) for an application (30) that is configured to perform the method of any of claims 1 to 10 degrees.
Vehicle system (10) comprising a device (20) according to claim 11 and a given application (30) of the vehicle, wherein the application (30) is formed,
- dependent at least partially forwarded by the to the application (30) vehicle-to-X messages (N) to determine whether at least a predetermined action of the application (30) is to be executed,
Provide the decision signal (D) which is representative as ¬ for that the vehicle-to-X messages (N) comprise data that trigger an execution of a predetermined action by the application (30) for the device (20) and -
- signal in response generated by the of the device (20) (S) that is representative of the Reliable ¬ ness of the decision-relevant vehicle-to-X-demand report (N_rel) to control execution of at least one given before ¬ action ,
PCT/EP2013/070195 2012-10-10 2013-09-27 Method and device for operating a vehicle application WO2014056731A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
DE201210218488 DE102012218488A1 (en) 2012-10-10 2012-10-10 Method and apparatus for operating an application of a vehicle
DE102012218488.0 2012-10-10

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US14434289 US9736170B2 (en) 2012-10-10 2013-09-27 Method and device for operating a vehicle application
CN 201380052680 CN104704792A (en) 2012-10-10 2013-09-27 Method and device for operating a vehicle application
EP20130770486 EP2907288A1 (en) 2012-10-10 2013-09-27 Method and device for operating a vehicle application

Publications (1)

Publication Number Publication Date
WO2014056731A1 true true WO2014056731A1 (en) 2014-04-17

Family

ID=49261560

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2013/070195 WO2014056731A1 (en) 2012-10-10 2013-09-27 Method and device for operating a vehicle application

Country Status (5)

Country Link
US (1) US9736170B2 (en)
EP (1) EP2907288A1 (en)
CN (1) CN104704792A (en)
DE (1) DE102012218488A1 (en)
WO (1) WO2014056731A1 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110080302A1 (en) * 2009-10-02 2011-04-07 Gm Global Technology Operations, Inc. Reducing the Computational Load on Processors by Selectively Discarding Data in Vehicular Networks
US7979706B1 (en) * 2004-09-29 2011-07-12 Rockwell Automation Technologies, Inc. Systems and methods for queuing an action in industrial automation systems

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102007053255B4 (en) 2007-11-08 2009-09-10 Continental Automotive Gmbh A method for processing messages and message processing device
US8742987B2 (en) * 2009-12-10 2014-06-03 GM Global Technology Operations LLC Lean V2X security processing strategy using kinematics information of vehicles
US8904183B2 (en) * 2010-03-25 2014-12-02 GM Global Technology Operations LLC Efficient technique to achieve non-repudiation and resilience to DoS attacks in wireless networks
US8593253B2 (en) * 2010-06-09 2013-11-26 Gm Global Technology Operations, Inc. Systems and methods for efficient authentication
DE102010041147A1 (en) 2010-09-21 2012-03-22 Continental Teves Ag & Co. Ohg Method and system for reducing a Reaktionstotzeit of a vehicle safety control device
DE102012204880A1 (en) * 2011-03-29 2012-10-04 Continental Teves Ag & Co. Ohg The method and vehicle-to-X communication system for the selective examination of data security sequences of received vehicle-to-X messages
US9106611B2 (en) * 2012-06-27 2015-08-11 GM Global Technology Operations LLC Method for efficient message verification on resource-constrained platforms for real-time tracking applications

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7979706B1 (en) * 2004-09-29 2011-07-12 Rockwell Automation Technologies, Inc. Systems and methods for queuing an action in industrial automation systems
US20110080302A1 (en) * 2009-10-02 2011-04-07 Gm Global Technology Operations, Inc. Reducing the Computational Load on Processors by Selectively Discarding Data in Vehicular Networks

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
None

Also Published As

Publication number Publication date Type
US9736170B2 (en) 2017-08-15 grant
US20150271185A1 (en) 2015-09-24 application
EP2907288A1 (en) 2015-08-19 application
CN104704792A (en) 2015-06-10 application
DE102012218488A1 (en) 2014-06-12 application

Similar Documents

Publication Publication Date Title
Ostermaier et al. Enhancing the security of local dangerwarnings in vanets-a simulative analysis of voting schemes
US20150172306A1 (en) Method and apparatus for enhancing security in an in-vehicle communication network
Kargl et al. Security engineering for vanets
CN102222183A (en) Mobile terminal software package safety detection method and system thereof
Herpel et al. Stochastic and deterministic performance evaluation of automotive CAN communication
Short et al. Assessment of high-integrity embedded automotive control systems using hardware in the loop simulation
Navet Controller area network [automotive applications]
CN102340398A (en) Security policy setting and determining method, and method and device for executing operation by application program
JP2006134203A (en) Distributed control system
US20080288135A1 (en) Secure Data Strategy for Vehicle Control Systems
US20110304425A1 (en) Systems and Methods for Efficient Authentication
Nilsson et al. Vehicle ECU classification based on safety-security characteristics
JP2012104049A (en) In-vehicle network system
JP2010027062A (en) Distributed control system
JP2007067812A (en) Frame monitoring device
JP5393932B1 (en) Data processing apparatus and the communication system
Broster Flexibility in dependable real-time communication
US20140022912A1 (en) Flexray communications using ethernet
US20090133121A1 (en) Method for processing messages and message processing device
JP2006253921A (en) Network system for vehicle
Li et al. Optimizations of an application-level protocol for enhanced dependability in FlexRay
JP2012174195A (en) Authentication system
Mundhenk et al. Security analysis of automotive architectures using probabilistic model checking
US20140020098A1 (en) Method and Vehicle-to-X Communication System for Selectively Checking Data Security Sequences of Received Vehicle-to-X Messages
EP2775660A1 (en) Message authentication method in communication system and communication system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13770486

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 14434289

Country of ref document: US

NENP Non-entry into the national phase in:

Ref country code: DE